6 min read
    0

    Ever Changing Compliance Laws Are Top of Mind for Data Privacy Week

    The New Year brings a hodge-podge of state Data Privacy laws, just in time for Data Privacy Week (January 22-28). See how CyberRes can help with the headache of compliance.
    by Micro Focus Employee in CyberRes
    7 min read
    0

    The Automated Security Operations Center—Myth or Reality?

    On paper, the idea of SOAR, Security Orchestration Automation and Response, sounds great. With SOAR capabilities in place, you are well on the way to eliminating the aforementioned challenges and creating a fully autonomous security operations center, right? Not so fast.
    by Micro Focus Employee in CyberRes
    3 min read
    0

    Reimagining Cyber Podcast: Energizing Cybersecurity, a National Lab Perspective

    In this week’s Reimagining Cyber podcast, hosts Stan Wisseman and Rob Aragao sit down with Ginger Wright to get the Idaho National Lab’s perspective on energy cybersecurity.
    by Micro Focus Employee in CyberRes
    2 min read
    0

    The Crucial Role Developers Play in a Secure Software Supply Chain

    Your software supply chain refers to the processes and tools you use to create, build, and distribute your software. Developers play a crucial role in securing your software supply chain.
    by Micro Focus Employee in CyberRes
    2 min read
    0

    Reimagining Cyber Podcast: Discussing Healthcare and Cybersecurity with Louis Lerman

    In this episode of the Reimagining Cyber podcast, special guest Louis Lerman, VP and CISO of Pediatrix Medical Group, discusses healthcare and cybersecurity.
    by Micro Focus Employee in CyberRes
    8 min read
    0

    Technology-Driven Innovation is Transforming the Way Our Governments Work

    There were lots of examples of Technology-Driven innovation provided at the recent Government Innovation Federal Summit that detailed how government is keeping pace with change and leveraging innovation to re-establish trust.
    by Micro Focus Employee in CyberRes
    8 min read
    0

    Adapt Cybersecurity Mesh Architecture (CSMA) by 2024 or Be Ready for the Cyber Shocks

    Cybersecurity Mesh Architecture is a more integrated security policy and is the most practical and adaptable approach for dealing with emerging modern threats.
    by Micro Focus Employee in CyberRes
    2 min read
    1

    3 Reasons DAST is more effective than IAST

    DAST (short for "Dynamic Application Security Testing") and IAST (short for "Interactive Application Security Testing") are both techniques for testing the security of web applications. While both approaches have their advantages and disadvantages, DAST is generally considered to be better than IAST for several reasons.
    by Micro Focus Employee in CyberRes
    4 min read
    0

    Data Discovery for Data Subject Rights

    In order to fulfil Data Subject Rights from GPDR such as right to access, right to rectification, right to erasure, right to data portability, it is very crucial to first identify personal data stored in different data sources of an organization.
    5 min read
    0

    Why Should You Use Recon and ArcSight SaaS for Log Management and Compliance?

    ArcSight SaaS Log Management and Compliance can help solve many problems that organizations face when building and maintaining an enterprise scale log management solution.
    by in CyberRes